For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)A . computer identityB . Windows serviceC . user identityD . Windows firewallE . default browserView AnswerAnswer: BD

January 28, 2021 No Comments READ MORE +

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco StealthwatchView AnswerAnswer: C

January 28, 2021 No Comments READ MORE +

Which SNMPv3 configuration must be used to support the strongest security possible?

Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andyB . asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...

January 28, 2021 No Comments READ MORE +

Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?A . PaasB . XaasC . IaasD . SaasView AnswerAnswer: A

January 28, 2021 No Comments READ MORE +

What is a characteristic of traffic storm control behavior?

What is a characteristic of traffic storm control behavior?A . Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.B . Traffic storm control cannot determine if the packet is unicast or broadcast.C . Traffic storm control monitors incoming traffic levels...

January 28, 2021 No Comments READ MORE +

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?A . AMPB . AnyConnectC . DynDNSD . TalosView AnswerAnswer: D

January 28, 2021 No Comments READ MORE +

What must be configured, based on a predefined threshold, to address this issue?

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD ....

January 28, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?.

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?.A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

January 27, 2021 No Comments READ MORE +

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?A . Cisco FirepowerB . Cisco UmbrellaC . Cisco Stealth watchD . NGIPSView AnswerAnswer: B

January 27, 2021 No Comments READ MORE +

With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?

With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?A . vulnerable softwareB . file analysisC . detectionsD . prevalenceE . threat root causeView AnswerAnswer: D

January 27, 2021 No Comments READ MORE +